Статті в журналах з теми "Software and hardware security"

Щоб переглянути інші типи публікацій з цієї теми, перейдіть за посиланням: Software and hardware security.

Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями

Оберіть тип джерела:

Ознайомтеся з топ-50 статей у журналах для дослідження на тему "Software and hardware security".

Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.

Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.

Переглядайте статті в журналах для різних дисциплін та оформлюйте правильно вашу бібліографію.

1

Gilmont, T., J. D. Legat, and J. J. Quisquater. "Hardware security for software privacy support." Electronics Letters 35, no. 24 (1999): 2096. http://dx.doi.org/10.1049/el:19991424.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Lamparth, Oliver, and Frank Bähren. "Hardware and Software Security in Infotainment Systems." Auto Tech Review 4, no. 12 (December 2015): 24–27. http://dx.doi.org/10.1365/s40112-015-1050-2.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Lamparth, Oliver, and Frank Bähren. "Hardware and Software Security in Infotainment Systems." ATZelektronik worldwide 10, no. 3 (May 30, 2015): 34–37. http://dx.doi.org/10.1007/s38314-015-0522-0.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Sidhu, Simranjeet, Bassam J. Mohd, and Thaier Hayajneh. "Hardware Security in IoT Devices with Emphasis on Hardware Trojans." Journal of Sensor and Actuator Networks 8, no. 3 (August 10, 2019): 42. http://dx.doi.org/10.3390/jsan8030042.

Повний текст джерела
Анотація:
Security of IoT devices is getting a lot of attention from researchers as they are becoming prevalent everywhere. However, implementation of hardware security in these devices has been overlooked, and many researches have mainly focused on software, network, and cloud security. A deeper understanding of hardware Trojans (HTs) and protection against them is of utmost importance right now as they are the prime threat to the hardware. This paper emphasizes the need for a secure hardware-level foundation for security of these devices, as depending on software security alone is not adequate enough. These devices must be protected against sophisticated attacks, especially if the groundwork for the attacks is already laid in devices during design or manufacturing process, such as with HTs. This paper will discuss the stealthy nature of these HT, highlight HT taxonomy and insertion methods, and provide countermeasures.
Стилі APA, Harvard, Vancouver, ISO та ін.
5

MACHER*, Georg, Harald SPORER, Eugen BRENNER, and Christian KREINER. "Signal-Layer Security and Trust-Boundary Identification based on Hardware-Software Interface Definition." Journal of Ubiquitous Systems and Pervasive Networks 10, no. 1 (March 7, 2018): 1–9. http://dx.doi.org/10.5383/juspn.10.01.001.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Granado-Criado, José M., Miguel A. Vega-Rodríguez, Juan M. Sánchez-Pérez, and Juan A. Gómez-Pulido. "Hardware security platform for multicast communications." Journal of Systems Architecture 60, no. 1 (January 2014): 11–21. http://dx.doi.org/10.1016/j.sysarc.2013.11.007.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Konikiewicz, Wojciech, and Marcin Markowski. "Analysis of Performance and Efficiency of Hardware and Software Firewalls." Journal of Applied Computer Science Methods 9, no. 1 (June 1, 2017): 49–63. http://dx.doi.org/10.1515/jacsm-2017-0003.

Повний текст джерела
Анотація:
Abstract Firewalls are key elements of network security infrastructure. They should guarantee the proper level of security and, at the same time, the satisfying performance in order to not increase the packet delay in the network. In the paper, we present the comparative study on performance and security of a few firewall technologies including hardware, software and virtual solutions. Three important criteria are considered: the maximal throughput of firewall, the introduced delay and the ability to resist Denial of Service attacks. We report results of experiments, present analysis and formulate a few practical conclusions.
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Kitsos, P., N. Sklavos, K. Papadomanolakis, and O. Koufopavlou. "Hardware implementation of bluetooth security." IEEE Pervasive Computing 2, no. 1 (January 2003): 21–29. http://dx.doi.org/10.1109/mprv.2003.1186722.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Dadashzadeh, Mohammad. "Choosing IT Platforms In The Age Of Stuxnet." Journal of Cybersecurity Research (JCR) 2, no. 1 (December 1, 2017): 17–26. http://dx.doi.org/10.19030/jcr.v2i1.10076.

Повний текст джерела
Анотація:
This paper addresses the question of choosing/investing in IT (hardware/software) platforms that avoid quick obsolescence and the underlying dilemmas of choosing proprietary software versus open source software, and opting for managed services such as public cloud computing versus in-house hardware/communication infrastructures. These dilemmas in strategic information systems planning have become more significant in light of the recent revelations of security backdoors in commercial software, encryption backdoors in communication software, and governmental access to private data on managed services for national security reasons. This paper considers enterprise-wide challenges and strategies for adopting open source software/hardware in response to these security concerns.
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Zhang, Yan Kun. "Computer Network Security Threats and Security Technology Research." Advanced Materials Research 971-973 (June 2014): 1440–43. http://dx.doi.org/10.4028/www.scientific.net/amr.971-973.1440.

Повний текст джерела
Анотація:
Networksecurity network system is presented, including hardware, software, and itstransmission in the network information security, network security threatsmainly include: software vulnerabilities, improper configuration, safetyconsciousness is not strong, virus, hacker attacks, etc. Is not only afirewall, network security is not anti-virus, intrusion monitoring, firewall,identity authentication, encryption, and other products of simple stack, butfrom the system to the application, from the device to the service ofrelatively complete, the system of the combination of security products.
Стилі APA, Harvard, Vancouver, ISO та ін.
11

Горлов, Алексей, Aleksey Gorlov, Михаил Рытов, Mikhail Rytov, Дмитрий Лысов, and Dmitriy Lysov. "AUTOMATED SYSTEM FOR ESTIMATION-EFFICIENCYSOFTWARE MEANS OF IN-FORMATION PROTECTION." Automation and modeling in design and management of 2019, no. 2 (June 23, 2019): 25–32. http://dx.doi.org/10.30987/article_5cf2d22c9dcd72.20436206.

Повний текст джерела
Анотація:
This article discusses the process of automating the assessment of the effectiveness of software and hardware information protection by creating an automated system. The main functions of the proposed system are: conducting an audit of information security, forming a model of information security threats, forming recommendations for creating a software and hardware system for protecting information, and creating organizational-technical documentation. The developed automated system for evaluating the effectiveness of software and hardware protection of information allows in an automated way to build a model of information security threats, to form organizational and technical documentation governing the protection of confidential information, and also to make recommendations for improving the software and hardware system for protecting information. The use of this system will significantly reduce the time and material costs of auditing information security and developing additional measures to protect information.
Стилі APA, Harvard, Vancouver, ISO та ін.
12

Xiaoying Liang. "Information System Security Design Using Hardware/Software Co-design Technology." International Journal of Digital Content Technology and its Applications 6, no. 8 (May 31, 2012): 351–60. http://dx.doi.org/10.4156/jdcta.vol6.issue8.41.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
13

Tomecek, Jozef. "Hardware optimizations of stream cipher rabbit." Tatra Mountains Mathematical Publications 50, no. 1 (December 1, 2011): 87–101. http://dx.doi.org/10.2478/v10127-011-0039-8.

Повний текст джерела
Анотація:
ABSTRACT Stream ciphers form part of cryptographic primitives focused on privacy. Synchronous, symmetric and software-oriented stream cipher Rabbit is member of final portfolio of European Union's eStream project. Although it was designed to perform well in software, employed operations seem to compute effi­ciently in hardware. 128-bit security, with no known security weaknesses is claimed by Rabbit's designers. Since hardware performance of Rabbit was only estimated in the proposal of algorithm, comparison of direct and optimized FPGA im­plementations of Rabbit stream cipher is presented, identifying algorithm bot­tlenecks, discussing optimization techniques applied to algorithm computations, along with key area/time trade-offs.
Стилі APA, Harvard, Vancouver, ISO та ін.
14

Mathew, Jimson, Rajat Subhra Chakraborty, Durga Prasad Sahoo, Yuanfan Yang, and Dhiraj K. Pradhan. "A Novel Memristor-Based Hardware Security Primitive." ACM Transactions on Embedded Computing Systems 14, no. 3 (May 21, 2015): 1–20. http://dx.doi.org/10.1145/2736285.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
15

Lavrischeva, Ekaterina Mikhailovna, and Sergey Vadimovich Zelenov. "Model-Based Approach to Ensuring Reliability and Security of Web-services." Proceedings of the Institute for System Programming of the RAS 32, no. 5 (2020): 153–66. http://dx.doi.org/10.15514/ispras-2020-32(5)-12.

Повний текст джерела
Анотація:
In the paper, we analyze problems of reliability and security in the world practice and in Russia. We consider aspects of modeling software/hardware systems from service resources and ready-made reuses with ensuring reliability and security. We present the formed basic and theoretical foundations of the modeling problem, the experience of using modern service tools SOA, SCA, SOAP in software/hardware systems and Web systems to ensure their reliability and security on the Internet. We note that software/hardware systems and Web systems are created by the assembly build method in modern environments: IBM WSDK + WebSphere, Apache Axis + Tomcat; Microsoft .Net + IIS, etc. Verification and testing of systems should be conducted for searching of errors that occur in exceptional cases (cyber-attacks, forbidden access to the database, etc.). We describe methods for analyzing such situations and applying reliability and security methods to ensure stable and trouble-free operation of software/hardware systems service components in the Internet information environment.
Стилі APA, Harvard, Vancouver, ISO та ін.
16

Nightingale, Edmund B., Daniel Peek, Peter M. Chen, and Jason Flinn. "Parallelizing security checks on commodity hardware." ACM SIGPLAN Notices 43, no. 3 (March 25, 2008): 308–18. http://dx.doi.org/10.1145/1353536.1346321.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
17

Desnitsky, V., and A. Meleshko. "SECURITY ANALYSIS OF SOFTWARE AND HARDWARE COMPONENTS IN WIRELESS SENSOR NETWORKS." Telecom IT 7, no. 1 (2019): 75–83. http://dx.doi.org/10.31854/2307-1303-2019-7-1-75-83.

Повний текст джерела
Анотація:
The paper comprises a review of approaches to security analysis of software and hardware components in wireless sensor networks. Research subject. The subject of the research is existing approaches to security analysis. Method. The methods of system analysis are applied in the work. Core results. A detailed analysis of existing threats and attacks on wireless sensor networks as well as an analysis of vulnerabilities and data transfer protocols between nodes of such systems has been performed. The main directions to ensure security of the wireless sensor networks are identified. Practical significance. The results obtained in this paper can be used to improve the means of protecting the wireless sensor networks from various cyber-physical attacks.
Стилі APA, Harvard, Vancouver, ISO та ін.
18

Wang, Li Nan. "Research on Data Security of Finance Software." Applied Mechanics and Materials 380-384 (August 2013): 2494–98. http://dx.doi.org/10.4028/www.scientific.net/amm.380-384.2494.

Повний текст джерела
Анотація:
Financial software technology development, promoted an enterprise effectively "integrated management", but also led to new safety problems. Financial software data security is a people pay much attention to the problem, in order to ensure the financial software of data security, many countries and enterprises not hesitate investment is huge endowment, to computer hardware and software research and development, in order to ensure the safety of computer data information. In computerized accounting work, accounting data security is a very important issue, it directly influences the success or failure of computerized accounting work, by the vast number of financial software users close concern.
Стилі APA, Harvard, Vancouver, ISO та ін.
19

Azuaje, Rafael. "Securing IoT: Hardware Vs Software." Journal of Advances in Information Technology 9, no. 3 (2018): 79–83. http://dx.doi.org/10.12720/jait.9.3.79-83.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
20

Biernacki, Lauren, Mark Gallagher, Zhixing Xu, Misiker Tadesse Aga, Austin Harris, Shijia Wei, Mohit Tiwari, Baris Kasikci, Sharad Malik, and Todd Austin. "Software-driven Security Attacks: From Vulnerability Sources to Durable Hardware Defenses." ACM Journal on Emerging Technologies in Computing Systems 17, no. 3 (August 2021): 1–38. http://dx.doi.org/10.1145/3456299.

Повний текст джерела
Анотація:
There is an increasing body of work in the area of hardware defenses for software-driven security attacks. A significant challenge in developing these defenses is that the space of security vulnerabilities and exploits is large and not fully understood. This results in specific point defenses that aim to patch particular vulnerabilities. While these defenses are valuable, they are often blindsided by fresh attacks that exploit new vulnerabilities. This article aims to address this issue by suggesting ways to make future defenses more durable based on an organization of security vulnerabilities as they arise throughout the program life cycle. We classify these vulnerability sources through programming, compilation, and hardware realization, and we show how each source introduces unintended states and transitions into the implementation. Further, we show how security exploits gain control by moving the implementation to an unintended state using knowledge of these sources and how defenses work to prevent these transitions. This framework of analyzing vulnerability sources, exploits, and defenses provides insights into developing durable defenses that could defend against broader categories of exploits. We present illustrative case studies of four important attack genealogies—showing how they fit into the presented framework and how the sophistication of the exploits and defenses have evolved over time, providing us insights for the future.
Стилі APA, Harvard, Vancouver, ISO та ін.
21

Stiles, Doug. "The Hardware Security Behind Azure Sphere." IEEE Micro 39, no. 2 (March 1, 2019): 20–28. http://dx.doi.org/10.1109/mm.2019.2898633.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
22

Drzevitzky, Stephanie, Uwe Kastens, and Marco Platzner. "Proof-Carrying Hardware: Concept and Prototype Tool Flow for Online Verification." International Journal of Reconfigurable Computing 2010 (2010): 1–11. http://dx.doi.org/10.1155/2010/180242.

Повний текст джерела
Анотація:
Dynamically reconfigurable hardware combines hardware performance with software-like flexibility and finds increasing use in networked systems. The capability to load hardware modules at runtime provides these systems with an unparalleled degree of adaptivity but at the same time poses new challenges for security and safety. In this paper, we elaborate on the presentation of proof carrying hardware (PCH) as a novel approach to reconfigurable system security. PCH takes a key concept from software security, known as proof-carrying code, into the reconfigurable hardware domain. We outline the PCH concept and discuss runtime combinational equivalence checking as a first online verification problem applying the concept. We present a prototype tool flow and experimental results demonstrating the feasibility and potential of the PCH approach.
Стилі APA, Harvard, Vancouver, ISO та ін.
23

Chen, Kejun, Lei Sun, and Qingxu Deng. "Hardware and software co-verification from security perspective in SoC platforms." Journal of Systems Architecture 122 (January 2022): 102355. http://dx.doi.org/10.1016/j.sysarc.2021.102355.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
24

Rushinek, Avi, and Sara F. Rushinek. "Accounting software evaluation: hardware, audit trails, backup, error recovery and security." Managerial Auditing Journal 10, no. 9 (December 1995): 29–37. http://dx.doi.org/10.1108/02686909510100887.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
25

Rana, Samir, Ritu Mewari, and Lata Nautiya. "Anti-theft Security System for Vehicles." International Journal of Engineering & Technology 7, no. 4.12 (October 4, 2018): 42. http://dx.doi.org/10.14419/ijet.v7i4.12.20990.

Повний текст джерела
Анотація:
In today’s world vehicles form an important asset to us, without which our life would be incomplete. But, when it comes to the security of our vehicles, we are very helpless. It is of a great concern, especially in metropolitan cities, where these incidents occur each and every day. So, in this paper, I have focussed on the security of vehicles. The setup consists of a mix of software and hardware. In software, I will be using an android application, and in hardware, a Raspberry pi board B+ model, a jaw or a gripper and other hardware devices. This whole system will allow you to connect with your vehicle from anytime, anywhere and confirm it’s security. A vehicle is usually the most expensive and important asset next to a home, so this system enables you to keep this asset at your fingertips using wireless technology. Think of it as a wireless leash to your car.
Стилі APA, Harvard, Vancouver, ISO та ін.
26

NATALIANA, DECY, SABAT ANWARI, and MUHAMMAD SYAHRUL AKBAR. "Implementasi Prototype Sistem Home security dengan Pemanfaatan Kode Akses berbasis Arduino Mega." ELKOMIKA: Jurnal Teknik Energi Elektrik, Teknik Telekomunikasi, & Teknik Elektronika 5, no. 2 (February 16, 2018): 119. http://dx.doi.org/10.26760/elkomika.v5i2.119.

Повний текст джерела
Анотація:
ABSTRAKSistem home security adalah suatu sistem yang dirancang sedemikian rupa yang digunakan untuk mengamankan sebuah perangkat hardware atau software. Home security yang dirancang ini berupa prototype yang terdiri dari input dan output. Input terdiri dari limit switch, motion sensor, Keypad 3x4. Output yang dirancang terdiri dari hardware dan software. Hardware berupa Lcd 16x2, LED, buzzer dan motor servo, sedangkan untuk software memberikan perintah ataupun program ke arduino mega yang untuk ditampilkan ke PC. Sistem home security yang telah direalisasikan mampu mengaktifkan buzzer yang berfungsi sebagai alarm rumah ketika melakukan kesalahan dalam memasukkan akses kode, dan akan menonaktifkan buzzer dan limit switch ketika akses kode yang dimasukkan benar. Saat berada didalam ruangan motion sensor detection akan langsung membaca pergerakan sehingga lampu yang berupa led akan menyala kemudian motor servo akan bergerak kearah masing-masing ruangan dan kamera merekam yang terjadi pada masing-masing ruangan dengan mengikuti arah motor servo yang telah di program 0o,90o dan 180o.Kata kunci: Security Sistem, Arduino Mega, Motion Detection, Limit Switch, Motor Servo.ABSTRACTHome security sistem is a sistem that is designed in a way that is used to secure a piece of hardware or software. Home security is a prototype designed consisting of input and output. Input consists of a limit switch, motion sensor, 3x4 Keypad. Output designed consists of hardware and software. Hardware such as Lcd 16x2, LED, buzzer and servo motors, while the software gives the command or program to arduino mega were to be shown to the PC. Home security sistem that has been realized is able to activate an alarm buzzer which serves as the home when it made a mistake in entering the access code, and will disable the buzzer and the limit switch when access code is entered correctly. When being in the room sensor motion detection will directly read the movement so that the lights in the form of LED will light then the servo motor will move toward each room and a kamera to record what happened in each room to follow the direction of servo motors that have been in the program 0o, 90o and 180o.Keywords: Security Sistem, Arduino Mega, Motion Detection, Limit Switch, Servo Motor
Стилі APA, Harvard, Vancouver, ISO та ін.
27

István, Zsolt, Soujanya Ponnapalli, and Vijay Chidambaram. "Software-defined data protection." Proceedings of the VLDB Endowment 14, no. 7 (March 2021): 1167–74. http://dx.doi.org/10.14778/3450980.3450986.

Повний текст джерела
Анотація:
Most modern data processing pipelines run on top of a distributed storage layer, and securing the whole system, and the storage layer in particular, against accidental or malicious misuse is crucial to ensuring compliance to rules and regulations. Enforcing data protection and privacy rules, however, stands at odds with the requirement to achieve higher and higher access bandwidths and processing rates in large data processing pipelines. In this work we describe our proposal for the path forward that reconciles the two goals. We call our approach "Software-Defined Data Protection" (SDP). Its premise is simple, yet powerful: decoupling often changing policies from request-level enforcement allows distributed smart storage nodes to implement the latter at line-rate. Existing and future data protection frameworks can be translated to the same hardware interface which allows storage nodes to offload enforcement efficiently both for company-specific rules and regulations, such as GDPR or CCPA. While SDP is a promising approach, there are several remaining challenges to making this vision reality. As we explain in the paper, overcoming these will require collaboration across several domains, including security, databases and specialized hardware design.
Стилі APA, Harvard, Vancouver, ISO та ін.
28

Zhu, Xiao Jing, and Yuan Guai Lin. "Analysis of Web Attack and Design of Defense System." Advanced Materials Research 756-759 (September 2013): 2428–32. http://dx.doi.org/10.4028/www.scientific.net/amr.756-759.2428.

Повний текст джерела
Анотація:
With the growing popularity of Web applications and Web attacks increasing; Web applications protection and data security have become the core focus of the information security system of enterprises and institutions. The paper briefly presents the harm of the common several kinds of Web attacks, and analyzes their principle, gives their defense measures. On this basis, the defense system of both software and hardware design is proposed. It achieves software defense design based on Web software development and Web application management, and hardware defense design based on H3C SecBlade IPS, to effectively guarantee the security of Web applications.
Стилі APA, Harvard, Vancouver, ISO та ін.
29

Achumba, Ifeyinwa Eucharia, Kennedy Chinedu Okafor, Gloria N. Ezeh, and Uchenna Hermes Diala. "OpenFlow Virtual Appliance." International Journal of Digital Crime and Forensics 7, no. 2 (April 2015): 31–52. http://dx.doi.org/10.4018/ijdcf.2015040103.

Повний текст джерела
Анотація:
Network forensics vis-a-vis cloud computing offerings can be leveraged to address the needs of enterprise-grade spyware solutions online. A modular, extensible cloud architecture with intrinsic support for efficient security monitoring is proposed and an implementation architecture which facilitates dynamic interface with OpenFlow hardware to create infinite flexibility in managing security decisions is presented. A forensic DataCenter model that integrates remote security monitoring using an intelligent Virtual Security Gateway in a cloud domain was developed as part of the work. An OpenFlow Virtual Appliance is proposed as a security hardware interface for thin clients connected to the Cloud Sypware Robot (CSR) server. The cloud ontology-Software as a Service (SaaS) model was used for the CSR application conveying several security benefits. The goal is to facilitate an open, service-based, online network forensics application that is transparently provisioned for users. The paper proposes a security foundation for next-generation enterprise-grade cloud computing.
Стилі APA, Harvard, Vancouver, ISO та ін.
30

Baraneetharan, E. "Review on Deep Learning based Network Security Tools in Detecting Real-Time Vulnerabilities." Journal of Ubiquitous Computing and Communication Technologies 3, no. 4 (January 31, 2022): 289–302. http://dx.doi.org/10.36548/jucct.2021.4.005.

Повний текст джерела
Анотація:
Network connected hardware and software systems are always open to vulnerabilities when they are connected with an outdated firewall or an unknown Wi-Fi access. Therefore network based anti-virus software and intrusion detection systems are widely installed in every network connected hardwares. However, the pre-installed security softwares are not quite capable in identifying the attacks when evolved. Similarly, the traditional network security tools that are available in the current market are not efficient in handling the attacks when the system is connected with a cloud environment or IoT network. Hence, recent algorithms of security tools are incorporated with the deep learning network for improving its intrusion detection rate. The adaptability of deep learning network is comparatively high over the traditional software tools when it is employed with a feedback network. The feedback connections included in the deep learning networks produce a response signal to their own network connections as a training signal for improving their work performances. This improves the performances of deep learning-based security tools while it is in real-time operation. The motive of the work is to review and present the attainments of the deep learning-based vulnerability detection models along with their limitations.
Стилі APA, Harvard, Vancouver, ISO та ін.
31

Shadeed Al-Mejibli, Intisar, and Dr Nawaf Rasheed Alharbe. "ANALYZING AND EVALUATING THE SECURITY STANDARDS IN WIRELESS NETWORK: A REVIEW STUDY." Iraqi Journal for Computers and Informatics 46, no. 1 (June 30, 2020): 32–39. http://dx.doi.org/10.25195/ijci.v46i1.248.

Повний текст джерела
Анотація:
Wireless networks used widely in office, home, and public places so security is one of the significant issues to keep the transmitted information safe. The applied security standards have been developed in response to the demand of high security and the developed hardware with software. Currently, the available security standards are (WEP, WPA, WPA2 and under development WPA3). These security standards are different in the offered security level base on the employed authentication method and encryption algorithms. The major objective of this paper is studying security standards and analyzing them based on their features. In addition to presenting a detailed review about WPA3 and its improvements over the older security standards. The conducted evaluations explained the differences among the Wi-Fi security standards in term of the offered security level, software and hardware requirements.
Стилі APA, Harvard, Vancouver, ISO та ін.
32

Kaliberda, Elena A., and Andrey M. Shabalin. "SOFTWARE AND HARDWARE STAND AS A MODERN TOOL FOR TEACHING STUDENTS TO CONFIGURE WIRELESS NETWORKS." Russian Journal of Education and Psychology 13, no. 6 (December 20, 2022): 45–59. http://dx.doi.org/10.12731/2658-4034-2022-13-6-45-59.

Повний текст джерела
Анотація:
Goal. Theoretical justification and development of a software and hardware stand in order to train future information security specialists in setting up modern wireless networks. Work methodology or method. The study is based on scientific regulations of the practice-oriented learning organization. The competence-based approach was used as its methodological base, theoretical (comparison, analysis, generalization, concretization, modeling) methods were used. The development and implementation of a software and hardware stand in the educational process was carried out at Tyumen State University in 2021-2022 with the involvement of students from the “Computer Security” direction of training. Results. The authors have developed and applied in the educational process a software and hardware laboratory stand that combines virtualization tools for software and hardware components of a computer network. The stand is used to study the modern infrastructure of a computer network which is used in enterprises and companies by students of the “Computer Security” specialization. It can also be used while teaching modern wireless networks configuration for students of the directions: “Mathematical support and administration of information systems”, “Computer science and computer technology”, “Software engineering”. On the basis of the stand a cycle of laboratory works was developed for senior students of the “Computer security” specialization as part of the study of the “Wireless computer networks security” discipline. Scope of results. The results of the study can be applied in the field of training future IT-specialists in the higher education system.
Стилі APA, Harvard, Vancouver, ISO та ін.
33

M., Vardhana, and Anil Kumar Bhat. "VLSI Implementation and Software Co-Simulation of Digital Image Watermarking with Increased Security." International Journal of Sensors, Wireless Communications and Control 10, no. 4 (December 18, 2020): 634–38. http://dx.doi.org/10.2174/2210327909666190319150314.

Повний текст джерела
Анотація:
Background: Security is one of the fundamental and essential factors, which has to be addressed in the field of communication. Communication refers to the exchange of useful information between two or more nodes. Sometimes it is required to exchange some of the confidential information such as a company’s logo, which needs to be hidden from the third person. The data that is being exchanged between these nodes has to be kept confidential and secured from unintended users. The three fundamental components of security are confidentiality, integrity and authentication. The data that is being exchanged has to be confidential, and only the authorized party should have access to the information that is being exchanged. One of the key methods for securing the data is encryption. Objective: The main objective of this paper was to address the problem of data hiding and security in communication systems. There is a need for having hardware resources for having high speed data security and protection. Methods: In this paper, we implemented image watermarking using LSB technique to hide a secret image, and employed encryption using Advanced Encryption Standard, to enhance the security of the image. An image is a two dimensional signal, with each pixel value representing the intensity level. The secure transmission of the image along the channel is a challenging task, because of the reason that, any individual can access it, if no security measures are taken. Conclusion: An efficient method of digital watermarking has been implemented with increased security and performance parameters are presented. Results: In this paper, hardware realization of image watermarking/encryption and dewatermarking/ decryption is implemented using Very Large Scale Integration. The design is verified by means of co-simulation using MATLAB and Xilinx. The paper also presents the performance parameters of the design, with respect to speed, area and power.
Стилі APA, Harvard, Vancouver, ISO та ін.
34

Henkel, Jorg. "Top Picks in Hardware and Embedded Security." IEEE Design & Test 38, no. 3 (June 2021): 4. http://dx.doi.org/10.1109/mdat.2021.3077859.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
35

Alhirabi, Nada, Omer Rana, and Charith Perera. "Security and Privacy Requirements for the Internet of Things." ACM Transactions on Internet of Things 2, no. 1 (February 2021): 1–37. http://dx.doi.org/10.1145/3437537.

Повний текст джерела
Анотація:
The design and development process for internet of things (IoT) applications is more complicated than that for desktop, mobile, or web applications. First, IoT applications require both software and hardware to work together across many different types of nodes with different capabilities under different conditions. Second, IoT application development involves different types of software engineers such as desktop, web, embedded, and mobile to work together. Furthermore, non-software engineering personnel such as business analysts are also involved in the design process. In addition to the complexity of having multiple software engineering specialists cooperating to merge different hardware and software components together, the development process requires different software and hardware stacks to be integrated together (e.g., different stacks from different companies such as Microsoft Azure and IBM Bluemix). Due to the above complexities, non-functional requirements (such as security and privacy, which are highly important in the context of the IoT) tend to be ignored or treated as though they are less important in the IoT application development process. This article reviews techniques, methods, and tools to support security and privacy requirements in existing non-IoT application designs, enabling their use and integration into IoT applications. This article primarily focuses on design notations, models, and languages that facilitate capturing non-functional requirements (i.e., security and privacy). Our goal is not only to analyse, compare, and consolidate the empirical research but also to appreciate their findings and discuss their applicability for the IoT.
Стилі APA, Harvard, Vancouver, ISO та ін.
36

Payne, Jeffery. "Integrating Application Security into Software Development." IT Professional 12, no. 2 (March 2010): 6–9. http://dx.doi.org/10.1109/mitp.2010.58.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
37

Brant, Christopher, Prakash Shrestha, Benjamin Mixon-Baca, Kejun Chen, Said Varlioglu, Nelly Elsayed, Yier Jin, Jedidiah Crandall, and Daniela Oliveira. "Challenges and Opportunities for Practical and Effective Dynamic Information Flow Tracking." ACM Computing Surveys 55, no. 1 (January 31, 2023): 1–33. http://dx.doi.org/10.1145/3483790.

Повний текст джерела
Анотація:
Information flow tracking was proposed more than 40 years ago to address the limitations of access control mechanisms to guarantee the confidentiality and integrity of information flowing within a system, but has not yet been widely applied in practice for security solutions. Here, we survey and systematize literature on dynamic information flow tracking (DIFT) to discover challenges and opportunities to make it practical and effective for security solutions. We focus on common knowledge in the literature and lingering research gaps from two dimensions— (i) the layer of abstraction where DIFT is implemented (software, software/hardware, or hardware) and (ii) the security goal (confidentiality and/or integrity). We observe that two major limitations hinder the practical application of DIFT for on-the-fly security applications: (i) high implementation overhead and (ii) incomplete information flow tracking (low accuracy). We posit, after review of the literature, that addressing these major impedances via hardware parallelism can potentially unleash DIFT’s great potential for systems security, as it can allow security policies to be implemented in a built-in and standardized fashion. Furthermore, we provide recommendations for the next generation of practical and efficient DIFT systems with an eye towards hardware-supported implementations.
Стилі APA, Harvard, Vancouver, ISO та ін.
38

Xiao, Chunhua, Lei Zhang, Yuhua Xie, Weichen Liu, and Duo Liu. "Hardware/Software Adaptive Cryptographic Acceleration for Big Data Processing." Security and Communication Networks 2018 (August 27, 2018): 1–24. http://dx.doi.org/10.1155/2018/7631342.

Повний текст джерела
Анотація:
Along with the explosive growth of network data, security is becoming increasingly important for web transactions. The SSL/TLS protocol has been widely adopted as one of the effective solutions for sensitive access. Although OpenSSL could provide a freely available implementation of the SSL/TLS protocol, the crypto functions, such as symmetric key ciphers, are extremely compute-intensive operations. These expensive computations through software implementations may not be able to compete with the increasing need for speed and secure connection. Although there are lots of excellent works with the objective of SSL/TLS hardware acceleration, they focus on the dedicated hardware design of accelerators. Hardly of them presented how to utilize them efficiently. Actually, for some application scenarios, the performance improvement may not be comparable with AES-NI, due to the induced invocation cost for hardware engines. Therefore, we proposed the research to take full advantages of both accelerators and CPUs for security HTTP accesses in big data. We not only proposed optimal strategies such as data aggregation to advance the contribution with hardware crypto engines, but also presented an Adaptive Crypto System based on Accelerators (ACSA) with software and hardware codesign. ACSA is able to adopt crypto mode adaptively and dynamically according to the request character and system load. Through the establishment of 40 Gbps networking on TAISHAN Web Server, we evaluated the system performance in real applications with a high workload. For the encryption algorithm 3DES, which is not supported in AES-NI, we could get about 12 times acceleration with accelerators. For typical encryption AES supported by instruction acceleration, we could get 52.39% bandwidth improvement compared with only hardware encryption and 20.07% improvement compared with AES-NI. Furthermore, the user could adjust the trade-off between CPU occupation and encryption performance through MM strategy, to free CPUs according to the working requirements.
Стилі APA, Harvard, Vancouver, ISO та ін.
39

Gertner, D. A., D. О. Leontiev, L. S. Nosov, and D. S. Shuchalin. "Hardware and software complex for ensuring information security when using electronic signatures." Vestnik Syktyvkarskogo Universiteta. Seriya 1: Matematika. Mekhanika. Informatika, no. 1 (2021): 43–55. http://dx.doi.org/10.34130/1992-2752_2021_1_43.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
40

Peng, Xiang, Peng Zhang, and Hanben Niu. "Architecture design of virtual-optics data security using parallel hardware and software." Optik 115, no. 1 (2004): 15–22. http://dx.doi.org/10.1078/0030-4026-00322.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
41

Liu, Yi, Hong-qi Zhang, Jiang Liu, and Ying-jie Yang. "A New Approach for Delivering Customized Security Everywhere: Security Service Chain." Security and Communication Networks 2017 (2017): 1–17. http://dx.doi.org/10.1155/2017/9534754.

Повний текст джерела
Анотація:
Security functions are usually deployed on proprietary hardware, which makes the delivery of security service inflexible and of high cost. Emerging technologies such as software-defined networking and network function virtualization go in the direction of executing functions as software components in virtual machines or containers provisioned in standard hardware resources. They enable network to provide customized security service by deploying Security Service Chain (SSC), which refers to steering flow through multiple security functions in a particular order specified by individual user or application. However, SSC Deployment Problem (SSC-DP) needs to be solved. It is a challenging problem for various reasons, such as the heterogeneity of instances in terms of service capacity and resource demand. In this paper, we propose an SSC-based approach to deliver security service to users without worrying about physical locations of security functions. For SSC-DP, we present a three-phase method to solve it while optimizing network and security resource allocation. The presented method allows network to serve a large number of flows and minimizes the latency seen by flows. Comparative experiments on the fat-tree and Waxman topologies show that our method performs better than other heuristics under a wide range of network conditions.
Стилі APA, Harvard, Vancouver, ISO та ін.
42

Bawane, Manjiri R., Madhavi S. Borkar, Payal R. Wawarkar, Sanika M. Shende, Heena K. Chandel, and Ketki R. Bhakare. "USB Key Based Antipiracy Solution." Journal of Advance Research in Computer Science & Engineering (ISSN: 2456-3552) 2, no. 2 (February 28, 2015): 12–17. http://dx.doi.org/10.53555/nncse.v2i2.507.

Повний текст джерела
Анотація:
USBkey is a new kind of intelligent security product that comprises microprocessor and operation system. Computer software is intellectual property, and is protected by copyright law. This paper proposes a software protection method that utilizes efficient calculation ability and security space of USB key in environment, which combines protection methods, identity authentication and trusted computing technology. In this project we proposed to develop a hardware based solution to prevent software piracy. A hardware based system consist of physical device and hence cannot be shared over the internet and hence eliminates the flaws of conventional mechanisms discussed above.
Стилі APA, Harvard, Vancouver, ISO та ін.
43

Zambreno, Joseph, Alok Choudhary, Rahul Simha, Bhagi Narahari, and Nasir Memon. "SAFE-OPS: An approach to embedded software security." ACM Transactions on Embedded Computing Systems 4, no. 1 (February 2005): 189–210. http://dx.doi.org/10.1145/1053271.1053279.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
44

Rehman, Shafiq, and Volker Gruhn. "An Effective Security Requirements Engineering Framework for Cyber-Physical Systems." Technologies 6, no. 3 (July 12, 2018): 65. http://dx.doi.org/10.3390/technologies6030065.

Повний текст джерела
Анотація:
Context and motivation: Cyber-Physical Systems (CPSs) are gaining priority over other systems. The heterogeneity of these systems increases the importance of security. Both the developer and the requirement analyst must consider details of not only the software, but also the hardware perspective, including sensor and network security. Several models for secure software engineering processes have been proposed, but they are limited to software; therefore, to support the processes of security requirements, we need a security requirements framework for CPSs. Question/Problem: Do existing security requirements frameworks fulfil the needs of CPS security requirements? The answer is no; existing security requirements frameworks fail to accommodate security concerns outside of software boundaries. Little or even no attention has been given to sensor, hardware, network, and third party elements during security requirements engineering in different existing frameworks. Principal Ideas/results: We have proposed, applied, and assessed an incremental security requirements evolution approach, which configures the heterogeneous nature of components and their threats in order to generate a secure system. Contribution: The most significant contribution of this paper is to propose a security requirements engineering framework for CPSs that overcomes the issue of security requirements elicitation for heterogeneous CPS components. The proposed framework supports the elicitation of security requirements while considering sensor, receiver protocol, network channel issues, along with software aspects. Furthermore, the proposed CPS framework has been evaluated through a case study, and the results are shown in this paper. The results would provide great support in this research direction.
Стилі APA, Harvard, Vancouver, ISO та ін.
45

Gavrilenko, Andrei V. "DISTANCE LEARNING AND INFORMATION SECURITY." RSUH/RGGU Bulletin. Series Information Science. Information Security. Mathematics, no. 1 (2021): 51–65. http://dx.doi.org/10.28995/2686-679x-2021-1-51-65.

Повний текст джерела
Анотація:
The article considers an issue of information security of the distance education systems. It analyzes the functions and architecture of the typical distance education system. With considering the requirements of information security it also discusses the university information system for solving the distance learning problems. The author defines valuable assets and information resources and describes the existing security threats. The subjects of interaction in the distance learning mode are presented. There is a consideration of the principal directions of the university’s activity in the distance learning system, requiring constant monitoring of information security. A threat model is worked out and the main security vulnerabilities are highlighted. The analysis of the causes and consequences of information security violation in the distance learning system is carried out and most vulnerable and critical nodes were identified. The hardware and software requirements for the remote mode work are regarded. A recommended list of hardware and software tools that ensure compliance with safety requirements is presented. The major lines of protection for distance learning systems are highlighted. The article proves the necessity of conducting a regular security assessment as a means for monitoring an effectiveness of the protection system.
Стилі APA, Harvard, Vancouver, ISO та ін.
46

Chen, Yun Ping. "Study on the Design of Computer Interlocking System Security's Reliability." Applied Mechanics and Materials 416-417 (September 2013): 1454–57. http://dx.doi.org/10.4028/www.scientific.net/amm.416-417.1454.

Повний текст джерела
Анотація:
The reliability of computer interlocking system security has a close tie with many aspects such as the data information transmission accuracy of the entire system. If the reliability of the system security is not high, security-related accidents will be very easily caused in enterprises and bring about huge losses to enterprises, so study on the design of computer interlocking system security's reliability is of great significance. In this paper, based on the introduction to the basic functions and composition of computer interlocking system, several factors influencing the design of computer interlocking system security's reliability are analyzed from both hardware and software, and finally several design plans targeted at how to improve the reliability of security are proposed.
Стилі APA, Harvard, Vancouver, ISO та ін.
47

Alekseev, V. V., V. A. Gridnev, A. V. Yakovlev, O. S. Mashkova, U. A. Savilova, D. A. Shibkov, and D. A. Yakovleva. "A System Approach to the Construction of the Software and Hardware Complex for Training Information Security Specialists." Vestnik Tambovskogo gosudarstvennogo tehnicheskogo universiteta 27, no. 1 (2021): 020–30. http://dx.doi.org/10.17277/vestnik.2021.01.pp.020-030.

Повний текст джерела
Анотація:
In order to train specialists in information security (IS), a software and hardware complex “Means of protecting information from leakage through technical channels” has been developed; it provides an opportunity to study the process of information leakage through technical channels and methods of its protection, as well as apply various modules and additional software (software) that clearly demonstrate the features of various methods of information security. The composition of this complex is shown: laboratory stands simulating acoustic, vibroacoustic, acoustoelectric channels and a channel of side electromagnetic radiation and interference. At each of the stands there are information security means (ISMs) that prevent the leakage of confidential information through the corresponding technical channel. To adjust the ISMs for acoustic and vibroacoustic channels, the ISIDORA software has been developed; it allows adjusting the level of the generated acoustic interference to meet the requirements of the security of the room and at the same time to have a comfortable conversation in this room.
Стилі APA, Harvard, Vancouver, ISO та ін.
48

Al-Qassim, Mohammed A., and Emad H. Al-Hemiary. "Network Perimeter Defenses Using Open-Source Software." Iraqi Journal of Information & Communications Technology 1, no. 2 (July 27, 2018): 41–51. http://dx.doi.org/10.31987/ijict.1.2.22.

Повний текст джерела
Анотація:
network security role grew exponentially in the late several years, especially with the notable amount of attacks that target all types of organizations and services. Thus, the need for more research on efficient and open source perimeter defense system and packet analysis and are rising. Intrusion detection system can afford significate role in protecting networks by detecting and reporting malicious behaviors. In this paper, an open source-based model was introduced that can provide security monitoring and logging, intrusion detection and prevention, firewall services and packet inspection and analysis. The proposed design provide high visibility and add a security layer to networks and data centers with many use cases such as: network forensics, security analysis, and production deployment. All the components and software were deployed with virtualization and container-based technology to get the benefits of these technologies like cost effective, cloud applicable, and flexible deployment across many hardware requirements. The results show that the proposed design presents detection capability of the attacks and visualization of the network traffic with security controls. This work also aims to accomplishes the OWASP A10:2017 which focus on insufficient logging and monitoring.
Стилі APA, Harvard, Vancouver, ISO та ін.
49

Yu, Ran, Jiao Jiao Zhang, Hong Fei Xu, and Shen Jin. "An Integrated Electricity Information Security Monitoring Platform." Applied Mechanics and Materials 701-702 (December 2014): 947–51. http://dx.doi.org/10.4028/www.scientific.net/amm.701-702.947.

Повний текст джерела
Анотація:
An integrated electricity information security monitoring platform is presented, electrical information security integrated real-time monitoring of the state power applied information security systems, security equipment, network equipment, network boundaries, desktop computers, to improve information security monitoring, early warning, emergency response and defense capabilities to protect IT hardware, software and network security, which can guarantee continuous, reliable and efficient operation.
Стилі APA, Harvard, Vancouver, ISO та ін.
50

Mittal, Sparsh, Himanshi Gupta, and Srishti Srivastava. "A survey on hardware security of DNN models and accelerators." Journal of Systems Architecture 117 (August 2021): 102163. http://dx.doi.org/10.1016/j.sysarc.2021.102163.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Ми пропонуємо знижки на всі преміум-плани для авторів, чиї праці увійшли до тематичних добірок літератури. Зв'яжіться з нами, щоб отримати унікальний промокод!

До бібліографії